Citation: | Nan Jiang, Ting Liu. Research on Voiceprint Recognition of Camouflage Voice Based on Deep Belief Network. International Journal of Automation and Computing, vol. 18, no. 6, pp.947-962, 2021. https://doi.org/10.1007/s11633-021-1283-2 |
[1] |
Y. H. Zheng. Development and application strategy of voiceprint recognition technology. Technology Wind, no. 21, pp. 9–10, 2017. DOI: 10.19392/j.cnki.1671-7341.201721007. (in Chinese)
|
[2] |
Z. Lian, Y. Li, J. H. Tao, J. Huang, M. Y. Niu. Expression analysis based on face regions in real-world conditions. International Journal of Automation and Computing, vol. 17, no. 1, pp. 96–107, 2020. DOI: 10.1007/s11633-019-1176-9.
|
[3] |
T. Kinnunen, H. Z. Li. An overview of text-independent speaker recognition: From features to supervectors. Speech Communication, vol. 52, no. 1, pp. 12–40, 2010. DOI: 10.1016/j.specom.2009.08.009.
|
[4] |
J. H. Tao, J. Huang, Y. Li, Z. Lian, M. Y. Niu. Semi-supervised ladder networks for speech emotion recognition. International Journal of Automation and Computing, vol. 16, no. 4, pp. 437–448, 2019. DOI: 10.1007/s11633-019-1175-x.
|
[5] |
C. L. Zhang. Acoustic Study of Disguised Voice, Ph. D. dissertation, Nankai University, China, 2005. (in Chinese)
|
[6] |
L. L. Stoll. Finding Difficult Speakers in Automatic Speaker Recognition, Ph. D. dissertation, University of California, USA, 2011.
|
[7] |
A. R. Reich. Detecting the presence of vocal disguise in the male voice. The Journal of the Acoustical Society of America, vol. 69, no. 5, pp. 1458–1461, 1981. DOI: 10.1121/1.385778.
|
[8] |
H. Hollien, W. Majewski. Speaker identification by long-term spectra under normal and distorted speech conditions. The Journal of the Acoustical Society of America, vol. 62, no. 4, pp. 975–980, 1977. DOI: 10.1121/1.381592.
|
[9] |
X. H. Shen, T. Jin, C. Z. Zhang, R. C. Wan. Feasibility analysis on identification of disguised falsetto. Journal of Criminal Investigation Police University of China, no. 2, pp. 124–128, 2018. DOI: 10.14060/j.issn.2095-7939.2018.02.024. (in Chinese)
|
[10] |
Y. Matveev. The problem of voice template aging in speaker recognition systems. In Proceedings of the 15th International Conference on Speech and Computer, Springer, Pilsen, Czech Republic, pp. 169-175, 2013. DOI: 10.1007/978-3-319-01931-4_46.
|
[11] |
H. J. Wu, Y. Wang, J. W. Huang. Identification of electronic disguised voices. IEEE Transactions on Information Forensics and Security, vol. 9, no. 3, pp. 489–500, 2014. DOI: 10.1109/TIFS.2014.2301912.
|
[12] |
Z. Z. Wu, A. Khodabakhsh, C. Demiroglu, J. Yamagishi, D. Saito, T. Toda, S. King. SAS: A speaker verification spoofing database containing diverse attacks. In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE, South Brisbane, Australia, pp. 4440-4444, 2015. DOI: 10.1109/ICASSP.2015.7178810.
|
[13] |
Y. Wang, H. J. Wu, J. W. Huang. Verification of hidden speaker behind transformation disguised voices. Digital Signal Processing, vol. 45, pp. 84–95, 2015. DOI: 10.1016/j.dsp.2015.06.010.
|
[14] |
W. Zhang. Auditory recognition of disguised speech. Science &Technology Vision, no. 13, pp. 10–12, 2016. DOI: 10.3969/j.issn.2095-2457.2016.13.005. (in Chinese)
|
[15] |
Y. P. Li, L. Lin, D. Y. Tao. Research on identification of electronic disguised voice based on GMM statistical parameters. Computer Technology and Development, vol. 27, no. 1, pp. 103–106, 2017. (in Chinese)
|
[16] |
P. Zhou, H. Shen, K. P. Zheng. Speaker recognition based on combination of MFCC and GFCC feature parameters. Journal of Applied Sciences, vol. 37, no. 1, pp. 24–32, 2019. DOI: 10.3969/j.issn.0255-8297.2019.01.003. (in Chinese)
|
[17] |
K. P. Zheng. The Research of Voiceprint Recognition Method Based on MFCC and GFCC Mixed Cepstrum, Master dissertation, Guilin University of Electronic Technology, China, 2017. (in Chinese)
|
[18] |
J. Cao, P. Pan. Research on GMM based speaker recognition technology. Computer Engineering and Applications, vol. 47, no. 11, pp. 114–117, 2011. DOI: 10.3778/j.issn.1002-8331.2011.11.033. (in Chinese)
|
[19] |
X. Yu, S. He, Y. X. Peng, W. Zhou. Pattern matching of voiceprint recognition based on GMM. Communications Technology, vol. 48, no. 1, pp. 97–101, 2015. DOI: 10.3969/j.issn.1002-0802.2015.01.020. (in Chinese)
|
[20] |
L. Lv. Research on Speaker Recognition Based on Deep Learning, Master dissertation, Southeast University, China, 2016. (in Chinese)
|
[21] |
H. Pan. Design and Implementation of Speaker Recognition System Based on Deep Learning, Master dissertation, Heilongjiang University, China, 2016. (in Chinese)
|
[22] |
N. Srivastava, G. Hinton, A. Krizhevsky, A. Sutskever, R. Salakhutdinov. Dropout: A simple way to prevent neural networks from overfitting. The Journal of Machine Learning Research, vol. 15, no. 1, pp. 1929–1958, 2014. DOI: 10.5555/2627435.2670313.
|
[23] |
Y. B. Xing, X. W. Zhang, C. Y. Zheng, T. Y. Cao. Establishment of bone-conducted speech database and mutual information analysis between bone and airconducted speeches. Technical Acoustics, vol. 38, no. 3, pp. 312–316, 2019. DOI: 10.16300/j.cnki.1000-3630.2019.03.013. (in Chinese)
|
[24] |
Y. Bengio, P. Lamblin, D. Popovici, H. Larochelle. Greedy layer-wise training of deep networks. In Proceedings of the 19th International Conference on Neural Information Processing Systems, Vancouver, Canada, pp. 153-160, 2006. DOI: 10.5555/2976456.2976476.
|